USN-4053-1: GVfs vulnerabilities

Publication date

9 July 2019

Overview

Several security issues were fixed in GVfs.


Packages

  • gvfs - Userspace virtual filesystem

Details

It was discovered that GVfs incorrectly handled the admin backend. Files
created or moved by the admin backend could end up with the wrong ownership
information, contrary to expectations. This issue only affected Ubuntu
18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04. (CVE-2019-12447, CVE-2019-12448,
CVE-2019-12449)

It was discovered that GVfs incorrectly handled authentication on its
private D-Bus socket. A local attacker could possibly connect to this
socket and issue D-Bus calls. (CVE-2019-12795)

It was discovered that GVfs incorrectly handled the admin backend. Files
created or moved by the admin backend could end up with the wrong ownership
information, contrary to expectations. This issue only affected Ubuntu
18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04. (CVE-2019-12447, CVE-2019-12448,
CVE-2019-12449)

It was discovered that GVfs incorrectly handled authentication on its
private D-Bus socket. A local attacker could possibly connect to this
socket and issue D-Bus calls. (CVE-2019-12795)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
19.04 disco gvfs –  1.40.1-1ubuntu0.1
gvfs-backends –  1.40.1-1ubuntu0.1
18.10 cosmic gvfs –  1.38.1-0ubuntu1.3.2
gvfs-backends –  1.38.1-0ubuntu1.3.2
18.04 bionic gvfs –  1.36.1-0ubuntu1.3.3
gvfs-backends –  1.36.1-0ubuntu1.3.3
16.04 xenial gvfs –  1.28.2-1ubuntu1~16.04.3
gvfs-backends –  1.28.2-1ubuntu1~16.04.3

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›